Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

quagga-1.2.4-2.13 RPM for armv7hl

From OpenSuSE Ports Tumbleweed for armv7hl

Name: quagga Distribution: openSUSE Tumbleweed
Version: 1.2.4 Vendor: openSUSE
Release: 2.13 Build date: Fri May 28 05:04:25 2021
Group: Productivity/Networking/Routing Build host: obs-arm-5
Size: 5401075 Source RPM: quagga-1.2.4-2.13.src.rpm
Summary: Routing Software for BGP, OSPF and RIP
Quagga is a routing software suite, providing implementations of
OSPFv2, OSPFv3, RIP v1 and v2, RIPv3 and BGPv4. Quagga is a fork of
GNU Zebra.






* Fri Apr 26 2019
  - bsc#1130588: Require shadow instead of old pwdutils
* Wed Nov 14 2018
  - Update to version 1.2.4
    Bugfix release
    for complete changelog.
  - Update to version 1.2.3
    Bugfix and security release
    for complete changelog.
    * Security related changes:
      + Fixes CVE-2018-5278
      + Fixes CVE-2018-5279
      + Fixes CVE-2018-5280
      + Fixes CVE-2018-5281
  - Update to version 1.2.2
    Bugfix and security release
    for complete changelog.
    * Security related changes:
      + Fixes CVE-2017-16227
  - Update to version 1.2.1
    Bugfix release
    for complete changelog.
  - Update to version 1.2.0
    Bugfix release
    for complete changelog.
  - Rebase patch:
    * 0001-systemd-change-the-WantedBy-target.patch
  - Removed patches (fixed upstream):
    * Quagga-2018-0543-bgpd.bsc1079798.patch
    * Quagga-2018-1114-bgpd.bsc1079799.patch
    * Quagga-2018-1550-bgpd-bsc1079800.patch
    * Quagga-2018-1975-bdpd.bsc1079801.patch
    * quagga-CVE-2017-16227-bgpd-Fix-AS_PATH-size-calculation.patch
* Fri Feb 09 2018
  - Applied security fix for bgpd DoS via specially crafted BGP
    UPDATE messages  (CVE-2017-16227,bsc#1065641)
    [+ quagga-CVE-2017-16227-bgpd-Fix-AS_PATH-size-calculation.patch]
  - Applied security fix for bgpd bounds check issue via attribute
    length (CVE-2018-5378,Quagga-2018-0543,bsc#1079798)
    [+ Quagga-2018-0543-bgpd.bsc1079798.patch]
  - Applied security fix for bgpd double free when processing UPDATE
    message (CVE-2018-5379,Quagga-2018-1114,bsc#1079799)
    [+ Quagga-2018-1114-bgpd.bsc1079799.patch]
  - Applied security fix for bgpd code-to-string conversion tables
    overrun (CVE-2018-5380,Quagga-2018-1550,bsc#1079800)
    [+ Quagga-2018-1550-bgpd-bsc1079800.patch]
  - Applied security fix for bgpd infinite loop on certain invalid
    OPEN messages (CVE-2018-5381,Quagga-2018-1975,bsc#1079801)
    [+ Quagga-2018-1975-bdpd.bsc1079801.patch]
* Thu Nov 23 2017
  - Replace references to /var/adm/fillup-templates with new
    %_fillupdir macro (boo#1069468)
* Tue Apr 11 2017
  - Disabled passwords in default zebra.conf config file, causing
    to disable vty telnet interface by default. The vty interface
    is available via "vtysh" utility using pam authentication to
    permit management access for root without password (bsc#1021669).
  - Changed owner of /etc/quagga to quagga:quagga to permit to manage
    quagga via vty interface.
* Mon Apr 03 2017
  - Remove FIXME's added by spec-cleaner by using proper phases for the
    prereq deps
  - Remove code checking for the proc mounting (build scripts do that
    for us anyway) + remove the commented out autoconf
  - Use content of %tmpfiles_create macro rather than 2 lines of checks
  - Use version in zebra provides/obsoletes to avoid rpmlint warning
* Thu Mar 30 2017
  - Update to quagga-1.1.1, a security and bug fix release (fate#323168):
    for complete changelog, a digest of the changes:
    - Telnet 'vty' interface DoS fix due to unbounded memory
      allocation (CVE-2017-5495,bsc#1021669)
    - revert opsf6d: Update router-LSA when nbr's interface-ID changes
    for complete changelog, a digest of the changes:
    - isisd: Fix size of malloc
    - isisd: check for the existance of the correct list
    - ospf6d: fix off-by-one on display of spf reasons
    - ospf6d: don't access nexthops out of bounds
    - bgpd: fix off-by-one in attribute flags handling
    - zebra: stack overrun in IPv6 RA receive code (CVE-2016-1245)
    - bgpd: Fix buffer overflow error in bgp_dump_routes_func
  - Added libfpm_pb0 and libquagga_pb0 shared library sub-packages,
    adjusted libzebra0 sub-package name to libzebra1.
  - Use tmpfiles_create RPM macro to create quagga rundir and adjust
    tmpfiles config to contain proper rundir at install time.
  - Removed obsolete patches:
  - Do not enable zebra's tcp interface (port 2600) to use default
    unix socket for communication between the daemons (fate#323170).
  - Added quagga.log and create and su statemets to logrotate config,
    changed default zebra log file name from quagga.log to zebra.log.
  - Cleaned up the spec file using spec-cleaner.
* Sat Oct 22 2016
  - Implement shared library policy
  - Check for user/group before adding them to the system
  - Trim description
* Tue Oct 18 2016
  - Add quagga-CVE-2016-1245-stack-overrun-in-IPv6-RA-receive.patch:
    Fix for a zebra stack overrun in IPv6 RA receive code.
    (CVE-2016-1245, bsc#1005258)
* Tue Jul 05 2016
  - Fix Group tag.



Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Nov 30 23:41:30 2021